11.6 Summary
Security is always important, and when access to your
organization's network is concerned,
it's paramount. We hope this chapter has given you
an understanding of how permission to access can be allowed or denied
to entire domains or individual properties of a single object.
Auditing is also part of security, and having mechanisms already
designed—so that they can be constantly working or dropped in
when required—is the best way to keep track of such a system.
Assigning permission and auditing entries to an object appears to be
a simple subject on the surface. However, once you start delving into
the art of setting permissions and auditing entries, it quickly
becomes obvious how much there is to consider. Global design is the
necessary first step.
While expanding your tree later by adding extra containers is rarely
a problem, in a large tree it makes sense to have some overall
guidelines or rules that allow you to impose a sense of structure on
the whole process of design and redesign. Ideally, the golden rules
and tables that we created should allow you to plan and implement
sensible permissions schemes, which was the goal of the chapter.
|